Grover et al., 2021 - Google Patents
A Review on Block chain and Data Mining Based Data Security MethodsGrover et al., 2021
- Document ID
- 13599020712776884659
- Author
- Grover P
- Prasad S
- Publication year
- Publication venue
- 2021 2nd International Conference on Big Data Analytics and Practices (IBDAP)
External Links
Snippet
In the 21st century, we are at the verge where emerging technologies are growing at the fast pace and it is important to seek existing researches related to application of block chain technology and It is significant to distinguish the current explores explicitly identified with the …
- 238000007418 data mining 0 title description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Salem et al. | Introduction to the data mining techniques in cybersecurity | |
Grover et al. | A Review on Block chain and Data Mining Based Data Security Methods | |
Datta et al. | Real-time threat detection in ueba using unsupervised learning algorithms | |
Onyema et al. | Cyber threats, attack strategy, and ethical hacking in telecommunications systems | |
Kshetri et al. | cryptoRAN: A review on cryptojacking and ransomware attacks wrt banking industry-threats, challenges, & problems | |
Younus et al. | A Survey on Network Security Monitoring: Tools and Functionalities | |
Jain et al. | A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment | |
Kebande | A novel cloud forensic readiness service model | |
Naoum et al. | An enhancement of the replacement steady state genetic algorithm for intrusion detection | |
Aswathy et al. | Privacy Breaches through Cyber Vulnerabilities: Critical Issues, Open Challenges, and Possible Countermeasures for the Future | |
Parameswarappa et al. | A Machine Learning-Based Approach for Anomaly Detection for Secure Cloud Computing Environments | |
Jeslin et al. | Securing Smart Networks and Privacy Intrusion Detection System Utilizing Blockchain and Machine Learning | |
Kishore et al. | Intrusion Detection System a Need | |
Kant | How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning | |
Khan et al. | AI-Powered Detection and Mitigation of Backdoor Attacks on Databases Server | |
Kazaure et al. | Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review. | |
Guelzim et al. | Formal methods of attack modeling and detection | |
Kumar et al. | Prediction of Probability of Server Intrusion Using Machine Learning Techniques | |
Babič et al. | A new systemic taxonomy of cyber criminal activity | |
Pierrot et al. | Hybrid intrusion detection in information systems | |
Makka et al. | A Structured Investigation of Network Security Strategies and its Applications | |
Shetty | Vulnerability Assessment for Cybersecurity using Machine learning | |
Priyalakshmi et al. | Intrusion Detection Using Enhanced Transductive Support Vector Machine | |
Aloffi | Real time network security intrusions and risk management: a survey | |
Giri et al. | Intrusion Detection System for Local Networks–A Review Study |